If you create a form based on a table with a lookup field, the lookup field becomes a(n) ________ Box control on the new form

Fill in the blank(s) with correct word

Combo

Computer Science & Information Technology

You might also like to view...

All of the following are unwanted software a hacker could install on your computer, EXCEPT ________

A) keystroke loggers B) ghosts C) Trojan horses D) rootkits

Computer Science & Information Technology

___________ allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent.

A. MUA B. DMARC C. DKIM D. MTA

Computer Science & Information Technology